Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 15:16
Behavioral task
behavioral1
Sample
5909d6d14d950b48b584f4a5efde04e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5909d6d14d950b48b584f4a5efde04e9.exe
Resource
win10v2004-20231215-en
General
-
Target
5909d6d14d950b48b584f4a5efde04e9.exe
-
Size
15KB
-
MD5
5909d6d14d950b48b584f4a5efde04e9
-
SHA1
cff3a2a95157a3069c1b185c99b1d532e28960b0
-
SHA256
98b8bd3ddcabb1fd179f218f609fbc9e296d26324868267709a686ccf7f56235
-
SHA512
64a70735222e6d33099f23855b5c55b2e97152f2b22942f1118f330a01f67acc364d04b2183a42d1bee38222f63bb7a749f864eb82abaca733bcbeaa17fdba17
-
SSDEEP
192:HqLjW+ys/rUcUYDdzluSakp0JTyRK7HVk/XdPLif63fr5vkH0QqeC+eZxxiTgbk1:ky+yOYc3akio6VkFPZ31sH0FZzi7S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3744 ld12.exe -
resource yara_rule behavioral2/memory/4620-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/files/0x0006000000023117-5.dat upx behavioral2/memory/3744-8-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4620-10-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysldtray = "c:\\windows\\ld12.exe" ld12.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\windows\ld12.exe 5909d6d14d950b48b584f4a5efde04e9.exe File created C:\Windows\34rdft.bat 5909d6d14d950b48b584f4a5efde04e9.exe File opened for modification \??\c:\windows\ld12.exe 5909d6d14d950b48b584f4a5efde04e9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4620 wrote to memory of 3744 4620 5909d6d14d950b48b584f4a5efde04e9.exe 88 PID 4620 wrote to memory of 3744 4620 5909d6d14d950b48b584f4a5efde04e9.exe 88 PID 4620 wrote to memory of 3744 4620 5909d6d14d950b48b584f4a5efde04e9.exe 88 PID 4620 wrote to memory of 4520 4620 5909d6d14d950b48b584f4a5efde04e9.exe 89 PID 4620 wrote to memory of 4520 4620 5909d6d14d950b48b584f4a5efde04e9.exe 89 PID 4620 wrote to memory of 4520 4620 5909d6d14d950b48b584f4a5efde04e9.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5909d6d14d950b48b584f4a5efde04e9.exe"C:\Users\Admin\AppData\Local\Temp\5909d6d14d950b48b584f4a5efde04e9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\windows\ld12.exec:\windows\ld12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\34rdft.bat2⤵PID:4520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5003aa1c15eb8820dec7b3a9b0e13081f
SHA13ef91fa3e090a2403a05a4049d420274190dd7c5
SHA256ff3bd185018a6ca60f16f138fe9b44365e357e4e005a5217b0427be6a3ab424e
SHA512abde6e931a20cfd028ed301cc1802145497220700445f285ac628824a5074a9ed712cd24cdc63ca4c0f8bd64943eeb7cfbc7672b9f30d791229176dad52a4737
-
Filesize
15KB
MD55909d6d14d950b48b584f4a5efde04e9
SHA1cff3a2a95157a3069c1b185c99b1d532e28960b0
SHA25698b8bd3ddcabb1fd179f218f609fbc9e296d26324868267709a686ccf7f56235
SHA51264a70735222e6d33099f23855b5c55b2e97152f2b22942f1118f330a01f67acc364d04b2183a42d1bee38222f63bb7a749f864eb82abaca733bcbeaa17fdba17